期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship 被引量:3
1
作者 Fahd N.Al-Wesabi Saleh Alzahrani +3 位作者 Fuad Alyarimi Mohammed Abdul Nadhem Nemri Mohammed M.Almazah 《Computer Systems Science & Engineering》 SCIE EI 2021年第6期297-311,共15页
In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The thir... In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The third gram of alphanumeric of the Markov model has been used with text-watermarking technologies to improve the performance and accuracy of tampering detection issues which are limited by the existing works reviewed in the literature of this study.The third-grade level of the Markov model has been used in this method as natural language processing technology to analyze an English text and extract the textual characteristics of the given contexts.Moreover,the extracted features have been utilized as watermark information and then validated with the attacked English text to detect any suspected tampering occurred on it.The embedding mechanism of CAZWNLP method will be achieved logically without effects or modifying the original text document to embed a watermark key.CAZWNLP has been implemented using VS code IDE with PHP.The experimental and simulation results using standard datasets of varying lengths show that the proposed approach can obtain high robustness and better detection accuracy of tampering common random insertion,reorder,and deletion attacks,e.g.,Comparison results with baseline approaches also show the advantages of the proposed approach. 展开更多
关键词 NLP text analysis English text watermarking ROBUSTNESS tampering detection
在线阅读 下载PDF
Payload Capacity Scheme for Quran Text Watermarking Based on Vowels with Kashida 被引量:1
2
作者 Ali A.R.Alkhafaji Nilam Nur Amir Sjarif +5 位作者 M.A Shahidan Nurulhuda Firdaus Mohd Azmi Haslina Md Sarkan Suriayati Chuprat Osamah Ibrahim Khalaf Ehab Nabiel Al-Khanak 《Computers, Materials & Continua》 SCIE EI 2021年第6期3865-3885,共21页
The most sensitive Arabic text available online is the digital Holy Quran.This sacred Islamic religious book is recited by all Muslims worldwide including non-Arabs as part of their worship needs.Thus,it should be pro... The most sensitive Arabic text available online is the digital Holy Quran.This sacred Islamic religious book is recited by all Muslims worldwide including non-Arabs as part of their worship needs.Thus,it should be protected from any kind of tampering to keep its invaluable meaning intact.Different characteristics of Arabic letters like the vowels(),Kashida(extended letters),and other symbols in the Holy Quran must be secured from alterations.The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio(PSNR)and Embedding Ratio(ER).A watermarking technique with enhanced attributes must,therefore,be designed for the Quran’s text using Arabic vowels with kashida.The gap addressed by this paper is to improve the security of Arabic text in the Holy Quran by using vowels with kashida.The purpose of this paper is to enhance the Quran text watermarking scheme based on a reversing technique.The methodology consists of four phases:The first phase is a pre-processing followed by the second phase-the embedding process phase—which will hide the data after the vowels.That is,if the secret bit is“1”,then the kashida is inserted;however,the kashida is not inserted if the bit is“0”.The third phase is the extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR(for the imperceptibility)and ER(for the capacity).The experimental results show that the proposed method of imperceptibility insertion is also optimized with the help of a reversing algorithm.The proposed strategy obtains a 90.5%capacity.Furthermore,the proposed algorithm attained 66.1%which is referred to as imperceptibility. 展开更多
关键词 Quran text watermarking Arabic text capacity IMPERCEPTIBILITY Kashida VOWELS reversing technique
在线阅读 下载PDF
Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique 被引量:1
3
作者 Ali A.R.Alkhafaji Nilam Nur Amir Sjarif +3 位作者 M.A.Shahidan Nurulhuda Firdaus Mohd Azmi Haslina Md Sarkan Suriayati Chuprat 《Computers, Materials & Continua》 SCIE EI 2021年第7期77-102,共26页
The text of the Quran is principally dependent on the Arabic language.Therefore,improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difcult... The text of the Quran is principally dependent on the Arabic language.Therefore,improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difcult challenges that researchers face today.Consequently,the diacritical marks in the Holy Quran which represent Arabic vowels(i,j.s)known as the kashida(or“extended letters”)must be protected from changes.The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio(PSNR),and Normalized Cross-Correlation(NCC);thus,the location for tamper detection accuracy is low.The gap addressed in this paper to improve the security of Arabic text in the Holy Quran by using vowels with kashida.To enhance the watermarking scheme of the text of the Quran based on hybrid techniques(XOR and queuing techniques)of the purposed scheme.The methodology propose scheme consists of four phases:The rst phase is pre-processing.This is followed by the second phase where an embedding process takes place to hide the data after the vowel letters wherein if the secret bit is“1”,it inserts the kashida but does not insert the kashida if the bit is“0”.The third phase is an extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR(for the imperceptibility),and NCC(for the security of the watermarking).Experiments were performed on three datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results were revealed the improvement of the NCC by 1.76%,PSNR by 9.6%compared to available current schemes. 展开更多
关键词 text watermarking tamper detection AUTHENTICATION quranic text exclusive-or operation queuing technique
在线阅读 下载PDF
A Text Zero-Watermarking Algorithm Based on Chinese Phonetic Alphabets 被引量:14
4
作者 ZHU Ping XIANG Guangli +3 位作者 SONG Wenna LI Ankang ZHANG Yuexin TAO Ran 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第4期277-282,共6页
The text watermarking is a feasible method to protect the copyright from being copied and tampered. In this paper, a text zero-watermarking algorithm is proposed based on the connection between the Chinese characters ... The text watermarking is a feasible method to protect the copyright from being copied and tampered. In this paper, a text zero-watermarking algorithm is proposed based on the connection between the Chinese characters and the Chinese phonetic alphabets. According to the predefined interval threshold, the proposed algorithm extracts the characteristics of the text content by valuing on the basis of the custom of Chinese phonetic alphabets. After being chaotic transformed, the algorithm combines the text characteristics with the embedded watermarking information in the Chinese text. The experimental results show that the watermarking's capability of preventing tampering is up to 0.1%, which demonstrates the strong robustness and resistance to aggressive behavior of the algorithm. 展开更多
关键词 text watermarking Chinese phonetic alphabets chaotic transformation text characteristic
原文传递
A New Fragile Watermarking Scheme for Text Documents Authentication 被引量:1
5
作者 XIANG Huazheng SUN Xingming TANG Chengliang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1661-1666,共6页
Because there are different modification types of deleting characters and inserting characters in text documents, the algorithms for image authentication can not be used for text documents authentication directly. A t... Because there are different modification types of deleting characters and inserting characters in text documents, the algorithms for image authentication can not be used for text documents authentication directly. A text watermarking scheme for text document authentication is proposed in this paper. By extracting the features of character cascade together with the user secret key, the scheme combines the features of the text with the user information as a watermark which is embedded into the transformed text itself. The receivers can verify the integrity and the authentication of the text through the blind detection technique. A further research demonstrates that it can also localize the tamper, classify the type of modification, and recover part of modified text documents. The aforementioned conclusion has been proved by both our experiment results and analysis. 展开更多
关键词 fragile text watermarking character cascade tamper localization tamper type classification tamper recovery
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部